HPE Alerts Employees of Data Breach After Russian Cyberattack on Office 365
Hewlett Packard Enterprise (HPE) has disclosed a significant data breach involving its Office 365 email environment, attributed to the Russian state-sponsored hacking group known as Midnight Blizzard, also referred to as Cozy Bear or...
DeepSeek Database Leaked – Full Control Over DB Secret keys, Logs & Chat History...
A security vulnerability in DeepSeek, a prominent Chinese AI startup, exposed a publicly accessible ClickHouse database containing highly sensitive information, including over a million lines of log streams.
The breach, which included chat logs, API...
What Is The Current State Of IoT Security?
The Internet of Things (IoT) continues to expand, embedding itself into more sectors than ever before. With its growth, however, comes increased risk and exposure to security threats.
Recent reports highlight the pressing need...
New NAND Chip Attack Lets Attackers Uncover Secrets And Reverse Engineer Products
A new hardware hacking technique targeting NAND flash memory chips has emerged, allowing attackers to extract sensitive data and reverse engineer products at a surprisingly low cost.
This "chip-off" attack involves physically removing the...
Critical OneDev DevOps Platform Vulnerability Let Attacker Read Sensitive Data
A critical vulnerability has been identified in the OneDev DevOps platform, posing significant security risks to organizations relying on this tool for their software development and deployment processes.
The issue, tracked as CVE-2024-45309, affects versions...
Microsoft Updates Recall Security Architecture Amid Controversy
In a move to address growing concerns over privacy and security, Microsoft has unveiled significant updates to the security architecture of its Recall feature, an AI-powered tool designed to help users find what they've...
Discord Launches End-To-End Encryption For Audio & Video Chats
Discord has announced the rollout of end-to-end encryption (E2EE) for audio and video chats on its platform.
This new feature dubbed the DAVE protocol, ensures that only the participants in a call can access the...
Revolutionizing Cloud Security With Zero Trust Architecture : A New Era Of Cyber Defense
It is not a secret that cloud computing is among the most valuable components for a 2024 operational business.
O-Reilly conducted a study, and from their report, more than 90% of businesses and organizations...
Researches Introduced MaskAnyone Toolkit To Minimize The Privacy Risks
Audio-visual data offers invaluable insights into human behavior and communication but raises significant privacy concerns, which proposes MaskAnyone, a toolkit for de-identifying individuals in audio-visual data while preserving data utility.
By combining face-swapping, auditory masking,...
Secure Online Payments — 10 Ways To Make E-commerce Payments Secure For Business
With the increasing popularity of online shopping, the safety and security of online transactions are critical for both customers and companies.
In 2024, e-commerce is estimated to account for around 22% of total worldwide...